Abstract
Recently, a new approach to networking called Software-Defined Networking (SDN) has emerged based on the idea of separating the centralized control plane from the data plane, which simplifies network management and meets the needs of modern data centers. However, the centralized nature of SDN also introduces new security risks that could hamper widespread SDN adoption, such as single points of failure. The controller is a critical vulnerability since an attacker who compromises it can control traffic routing and severely disrupt the network. SDN is still an emerging technology, utilizing deep learning for Network Intrusion Detection Systems (NIDS) is an effective security solution that could enable more accurate and adaptive threat detection to against attacks targeting vulnerabilities introduced by centralized control. In this paper, we describe a Siamese-based method for NIDSs in SDN. When it comes to the process of training and testing models based on Siamese Networks, making effective pairs is a key strategy that can have a considerable impact on the outcome. To prevent overfitting, we enhance the data pairing both within and across classes. The findings of our methodology demonstrate a notable enhancement in the efficacy of NIDS, resulting in an accuracy rate of approximately 100%. This estimated accuracy exceeds that of baseline methods. The study’s conclusions facilitate the development of reliable IDS systems tailored for SDN environments.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
ONF. Software-Defined Networking (SDN) Definition. https://www.opennetworking.org
Karakus, M., Durresi, A.: Quality of service (QoS) in software defined networking (SDN): a survey. J. Netw. Comput. Appl. 80, 200–218 (2017). https://doi.org/10.1016/j.jnca.2016.12.019. ISSN: 1084-8045
Alhaj, A.N., Dutta, N.: Analysis of security attacks in SDN network: a comprehensive survey. In: Sarma, H.K.D., Balas, V.E., Bhuyan, B., Dutta, N. (eds.) Contemporary Issues in Communication, Cloud and Big Data Analytics. LNNS, vol. 281, pp. 27–37. Springer, Singapore (2022). https://doi.org/10.1007/978-981-16-4244-9_3
Dargahi, T., Caponi, A., Ambrosin, M., Bianchi, G., Conti, M.: A survey on the security of stateful SDN data planes. IEEE Commun. Surv. Tutor. 19(3), 1701–1725 (2017)
Elsayed, M.S., Le-Khac, N.-A., Jurcut, A.D.: InSDN: a novel SDN intrusion dataset. IEEE Access 8, 165263–165284 (2020)
O’Shea, K., Nash, R.: An introduction to convolutional neural networks. arXiv preprint arXiv:1511.08458 (2015)
Li, Z., et al.: A survey of convolutional neural networks: analysis, applications, and prospects. IEEE Trans. Neural Netw. Learn. Syst. 33(12), 6999–7019 (2021)
Bromley, J., et al.: Signature verification using a “siamese” time delay neural network. In: Advances in Neural Information Processing Systems, vol. 6 (1993)
Koch, G., Zemel, R., Salakhutdinov, R.: Siamese neural networks for one-shot image recognition. In: International Conference on Machine Learning, Lille, France, pp. 1–8 (2015)
Jeong, Y., Lee, S., Park, D., Park, K.H.: Accurate age estimation using multi-task siamese network-based deep metric learning for frontal face images. Symmetry 10(385), 1–15 (2018)
Zhang, C., Liu, W., Ma, H., Fu, H.: Siamese neural network based gait recognition for human identification. In: International Conference on Acoustics, Speech and Signal Processing (ICASSP), Shanghai, China, pp. 2832–2836. IEEE (2016)
Tang, T.A., Mhamdi, L., McLernon, D., Zaidi, S.A.R., Ghogho, M.: Deep learning approach for network intrusion detection in software defined networking. In: 2016 International Conference on Wireless Networks and Mobile Communications (WINCOM), Fez, Morocco, pp. 258–263 (2016). https://doi.org/10.1109/WINCOM.2016.7777224
Abubakar, A., Pranggono, B.: Machine learning based intrusion detection system for software defined networks, pp. 138–143 (2017). https://doi.org/10.1109/EST.2017.8090413
Tavallaee, M., Bagheri, E., Lu, W., Ghorbani, A.A.: A detailed analysis of the KDD CUP 99 data set. In: Proceedings of the IEEE Symposium on Computational Intelligence for Security and Defense Applications, pp. 1–6. IEEE (2009)
Elsayed, M.S., Le-Khac, N.-A., Dev, S., Jurcut, A.D.: Machine-learning techniques for detecting attacks in SDN. In: 2019 IEEE 7th International Conference on Computer Science and Network Technology (ICCSNT) (2019). https://doi.org/10.1109/iccsnt47585.2019.8962519
Said Elsayed, M., Le-Khac, N.-A., Dev, S., Jurcut, A.D.: Network anomaly detection using LSTM based autoencoder. In: Proceedings of the 16th ACM Symposium on QoS and Security for Wireless and Mobile Networks (Q2SWinet 2020), pp. 37–45. Association for Computing Machinery, New York (2020). https://doi.org/10.1145/3416013.3426457
Li, D., Yu, C., Zhou, Q., Yu, J.: Using SVM to detect DDoS attack in SDN network. In: IOP Conference Series: Materials Science and Engineering, vol. 466, p. 012003 (2018). https://doi.org/10.1088/1757-899X/466/1/012003
Lee, T.-H., Chang, L.-H., Syu, C.-W.: Deep learning enabled intrusion detection and prevention system over SDN networks. In: 2020 IEEE International Conference on Communications Workshops (ICC Workshops), Dublin, Ireland, pp. 1–6 (2020). https://doi.org/10.1109/ICCWorkshops49005.2020.9145085
Draper-Gil, G., Lashkari, A.H., Mamun, M.S.I., Ghorbani, A.A.: Characterization of encrypted and VPN traffic using time-related. In: Proceedings of the 2nd International Conference on Information Systems Security and Privacy (ICISSP), pp. 407–414 (2016)
Krishnan, P., Duttagupta, S., Achuthan, K.: VARMAN: multi-plane security framework for software defined networks. Comput. Commun. 148, 215–239 (2019)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Nguyen, D.H., Tran, N.K., Le-Khac, NA. (2023). A Siamese-Based Approach for Network Intrusion Detection Systems in Software-Defined Networks. In: Dang, T.K., Küng, J., Chung, T.M. (eds) Future Data and Security Engineering. Big Data, Security and Privacy, Smart City and Industry 4.0 Applications. FDSE 2023. Communications in Computer and Information Science, vol 1925. Springer, Singapore. https://doi.org/10.1007/978-981-99-8296-7_14
Download citation
DOI: https://doi.org/10.1007/978-981-99-8296-7_14
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-99-8295-0
Online ISBN: 978-981-99-8296-7
eBook Packages: Computer ScienceComputer Science (R0)